CIS8018: Toyota's Security Enhancement Plan, ISO Standards, 2018
VerifiedAdded on 2023/06/03
|17
|4318
|212
Report
AI Summary
This report assesses Toyota's information security program, focusing on improvements to the security framework, roles of security personnel, and the implementation of ISO security standards. It addresses issues like click jacking, CSRF vulnerabilities, and email spoofing, proposing mitigation plans including website testing, criminal law implementation, and HackerOne compliance. The report also details current security roles such as security designers, developers, IT system managers, initiation managers, information managers, and maintenance managers, suggesting improvements to these roles and the overall security framework through updated software and proper training. Ultimately, the report aims to enhance Toyota's security posture by aligning it with industry best practices and addressing potential threats.

Running Head: TOYOTA
Toyota
Name of the Student
Name of the University
Author Note
Toyota
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2
TOYOTA
Table of Contents
Size of the Organization..................................................................................................................3
Current Roles and Titles for the security personnel........................................................................3
Suggestion of Improvement.........................................................................................................3
Incorporate Training requirements..................................................................................................3
Usage of the ISO Security standard.................................................................................................3
Preferred ISO Security standard......................................................................................................3
Threats that will be covered by the ISO security standard..........................................................3
TOYOTA
Table of Contents
Size of the Organization..................................................................................................................3
Current Roles and Titles for the security personnel........................................................................3
Suggestion of Improvement.........................................................................................................3
Incorporate Training requirements..................................................................................................3
Usage of the ISO Security standard.................................................................................................3
Preferred ISO Security standard......................................................................................................3
Threats that will be covered by the ISO security standard..........................................................3

3
TOYOTA
Introduction
Projection of the security issues is one of the main concern of the business organizations .
This is the main concern is now dealt through information technology of all large-scale
organization. The report is mainly put its focus to the processing of the security glitches that are
present in the functioning of the database management system. Through this report a brief idea
will be given about the size of the organization and the roles of the security managers that are
present and are concerned with persisting security problems .The security plan is discussed by
their consent and is being proposed to mainly focus on the better structuring of the organization.
and in addition suggest improvements that can be used in the structuring of better security
framework. The security personnel’s (Jeong and Ko 2016) will play an important role in
managing and creating a security framework. The discussions are made in context about the
using of the protocol that helps in better transaction of the data management system. The main
instances shown in this context will ensure the fact that the improvising of the ISO security
services. Further information that are showcased in the report also discusses about the
implementation of the preferred ISO security standard (Baldwin and Lopez‐Gonzalez, 2015).
Apart from the above theories, there are conceptual sections, which also focus the ISO Standard.
The article mainly contexts the process of performing through mitigation with the projection of
the security issue mitigation. The better management of the cyber security problems to check the
cyber-attacks. There are future improvement suggestions will build a better system architecture
to cross check the main issue that has been present in the projection of the data management,
this main projection that is to be performed incurs the fact that the commencement of the security
issues will be performed with high proficiency (Geller, 2015).
TOYOTA
Introduction
Projection of the security issues is one of the main concern of the business organizations .
This is the main concern is now dealt through information technology of all large-scale
organization. The report is mainly put its focus to the processing of the security glitches that are
present in the functioning of the database management system. Through this report a brief idea
will be given about the size of the organization and the roles of the security managers that are
present and are concerned with persisting security problems .The security plan is discussed by
their consent and is being proposed to mainly focus on the better structuring of the organization.
and in addition suggest improvements that can be used in the structuring of better security
framework. The security personnel’s (Jeong and Ko 2016) will play an important role in
managing and creating a security framework. The discussions are made in context about the
using of the protocol that helps in better transaction of the data management system. The main
instances shown in this context will ensure the fact that the improvising of the ISO security
services. Further information that are showcased in the report also discusses about the
implementation of the preferred ISO security standard (Baldwin and Lopez‐Gonzalez, 2015).
Apart from the above theories, there are conceptual sections, which also focus the ISO Standard.
The article mainly contexts the process of performing through mitigation with the projection of
the security issue mitigation. The better management of the cyber security problems to check the
cyber-attacks. There are future improvement suggestions will build a better system architecture
to cross check the main issue that has been present in the projection of the data management,
this main projection that is to be performed incurs the fact that the commencement of the security
issues will be performed with high proficiency (Geller, 2015).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4
TOYOTA
Size of the Organization
Toyota is Japanese multinational business organization. This automobile manufacturing
company has a huge global audience base for the regular cars. This is the main reason that the
more than 360,000 employees who are hired by the automobile organization (Maynard, 2018)
perform the projection of the commencement of their project. Toyota has been growing
successfully as an organization. the exponential range of growth of this organization is
showcased when it was declared when Toyota was name as the 6th largest country in the world
this made it as one of the most important organization as in the year 2018.Toyota is now
expected to manufacture more than 10 million vehicles per year. These statistics prove the rate of
the success of the organization of the organization. The total number of vehicles that Toyota has
manufactures yearly can even be estimated up to that of the 200 million. Toyota is considered
one of the largest business organization in the processing of the business management system.
Toyota is also termed and considered as the largest hybrid electric vehicle manufacturing
company. These facts are enough to ensure that Toyota to be a large-scale industry. The
organization was found in the year 1937. The company has been thriving ever since.
Development of the Security Plan
Issues that are present in the prosecution of the business management includes the
problem regarding the click jacking of the pages and projection. These sensitive actions are
taken into consideration. CSRF vulnerability demonstration is present in the projection of the
business management (Penna and Geels 2015) discusses the type of threats that could affect the
organization. Another major problem that is present in the course of the functioning includes the
processing the security issue prosecution. The main reason that the prosecution of the data
management occurs is because of the the undue usage of the unpatched browsers that affects the
TOYOTA
Size of the Organization
Toyota is Japanese multinational business organization. This automobile manufacturing
company has a huge global audience base for the regular cars. This is the main reason that the
more than 360,000 employees who are hired by the automobile organization (Maynard, 2018)
perform the projection of the commencement of their project. Toyota has been growing
successfully as an organization. the exponential range of growth of this organization is
showcased when it was declared when Toyota was name as the 6th largest country in the world
this made it as one of the most important organization as in the year 2018.Toyota is now
expected to manufacture more than 10 million vehicles per year. These statistics prove the rate of
the success of the organization of the organization. The total number of vehicles that Toyota has
manufactures yearly can even be estimated up to that of the 200 million. Toyota is considered
one of the largest business organization in the processing of the business management system.
Toyota is also termed and considered as the largest hybrid electric vehicle manufacturing
company. These facts are enough to ensure that Toyota to be a large-scale industry. The
organization was found in the year 1937. The company has been thriving ever since.
Development of the Security Plan
Issues that are present in the prosecution of the business management includes the
problem regarding the click jacking of the pages and projection. These sensitive actions are
taken into consideration. CSRF vulnerability demonstration is present in the projection of the
business management (Penna and Geels 2015) discusses the type of threats that could affect the
organization. Another major problem that is present in the course of the functioning includes the
processing the security issue prosecution. The main reason that the prosecution of the data
management occurs is because of the the undue usage of the unpatched browsers that affects the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5
TOYOTA
business organization in a negative way. The main problem that is present in the course of the
projection of the security issue proves that the imposters are present in the course who wants to
gain access to the projection of the data, generated by the business organization of the Toyota.
There must be security headers that are required in the functioning of the Toyota. These
headers that are required for the processing of the business management is missing in case of the
Toyota Company. Another issue that is present in the course of the completion of the business
terminology incurs due to proper email transaction. Toyota lacks in the prosecution of the email
spoofing issue which lead to the loopholes that the imposters used to can gain data .
Plans to mitigate the issues
Plans to mitigate the issue includes the fact that the projection of the website that is
created by the testing of the processed website helps in the functioning of the Toyota in a better
way. This instigates the fact that the prosecution of the phishing attack proof must be
performed, as it will help in providing robustness in the processing of the business management
system. The networks that are being approached from the United States will proceed with the
projection of the network manipulation that is done by the imposters (Rustambekov, 2015). The
implementation of the criminal law in the projection of the official website of Toyota must be
done. This implementation of the data processing will include that any external authority does
not access the transaction of the data. In case the terminology that is present in the prosecution of
the data management system, the main projection will be performed with the help of the robust
infrastructure. The compliance of the HackerOne terminology is important in the course of data
management and this is the main reason that the business processing will be performed with the
help of this law implementation. Test properties must be included in the functioning of the data
assessment. This helps in better prosecution of the security issues.
TOYOTA
business organization in a negative way. The main problem that is present in the course of the
projection of the security issue proves that the imposters are present in the course who wants to
gain access to the projection of the data, generated by the business organization of the Toyota.
There must be security headers that are required in the functioning of the Toyota. These
headers that are required for the processing of the business management is missing in case of the
Toyota Company. Another issue that is present in the course of the completion of the business
terminology incurs due to proper email transaction. Toyota lacks in the prosecution of the email
spoofing issue which lead to the loopholes that the imposters used to can gain data .
Plans to mitigate the issues
Plans to mitigate the issue includes the fact that the projection of the website that is
created by the testing of the processed website helps in the functioning of the Toyota in a better
way. This instigates the fact that the prosecution of the phishing attack proof must be
performed, as it will help in providing robustness in the processing of the business management
system. The networks that are being approached from the United States will proceed with the
projection of the network manipulation that is done by the imposters (Rustambekov, 2015). The
implementation of the criminal law in the projection of the official website of Toyota must be
done. This implementation of the data processing will include that any external authority does
not access the transaction of the data. In case the terminology that is present in the prosecution of
the data management system, the main projection will be performed with the help of the robust
infrastructure. The compliance of the HackerOne terminology is important in the course of data
management and this is the main reason that the business processing will be performed with the
help of this law implementation. Test properties must be included in the functioning of the data
assessment. This helps in better prosecution of the security issues.

6
TOYOTA
Current Roles and Titles for the security personnel
Roles that are currently employed in the projection of the Toyota group are as follows: -
Security designer: the main purpose of hiring a security designer is that a security
designer will ensure the design the infrastructure of the software that will be used in
terminology of the data storage. The main purpose of the security design manager keeps a
check on the functioning of the security developers. The security developers are provided
with reference and this leads to the fact that the processing of the business management
will be performed with highest robustness. Proper monitoring of the business
management is one of the most important aspect that confirms the fact that the entire
infrastructure that is being built is performed with highest proficiency. This ensures the
fact that the projection of the infrastructure is robust in nature as the infrastructure that is
present in the projection of the data storage platform. The main projection of this process
is because Toyota has been concerned regarding the security of their system. this acts as
the reason that the projection of the data insecurity that is present in the course of data
storage
Security Developer: Security developers works under the commands of security
designing manager. This team of developers are mainly responsible for the projection of
the data security for the Toyota. This ensures the fact that the entire process of security
development revolves around the projection of this developers. This is the main reason
that the people who are being hired for this past are highly qualified and the concepts
regarding the cyber security is very high. This is the reason that the developers efficiently
complete the projection of a secured database.
TOYOTA
Current Roles and Titles for the security personnel
Roles that are currently employed in the projection of the Toyota group are as follows: -
Security designer: the main purpose of hiring a security designer is that a security
designer will ensure the design the infrastructure of the software that will be used in
terminology of the data storage. The main purpose of the security design manager keeps a
check on the functioning of the security developers. The security developers are provided
with reference and this leads to the fact that the processing of the business management
will be performed with highest robustness. Proper monitoring of the business
management is one of the most important aspect that confirms the fact that the entire
infrastructure that is being built is performed with highest proficiency. This ensures the
fact that the projection of the infrastructure is robust in nature as the infrastructure that is
present in the projection of the data storage platform. The main projection of this process
is because Toyota has been concerned regarding the security of their system. this acts as
the reason that the projection of the data insecurity that is present in the course of data
storage
Security Developer: Security developers works under the commands of security
designing manager. This team of developers are mainly responsible for the projection of
the data security for the Toyota. This ensures the fact that the entire process of security
development revolves around the projection of this developers. This is the main reason
that the people who are being hired for this past are highly qualified and the concepts
regarding the cyber security is very high. This is the reason that the developers efficiently
complete the projection of a secured database.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

7
TOYOTA
Information Technology system manager: Information Technology system manager is
mainly concerned with the versions of software that is used on the completion of the
project commencement (Rustambekov, 2015).. This incurs the fact that they select the
software’s that are used in the database. This ensures that the processing of the
infrastructure materials are selected by them as they have a valid and in depth conceptual
knowledge regarding the subject. The collaboration of the security design manager and
the information technology system manager acts as a wing for the Toyota organization as
the data management can be performed with the help of proper knowledge gaining
regarding the stuffs that are to be used in the prosecution off the database. The security
system designer has been acting as one of the most important part of the job role of the
information technology system managers they need to understand the configuration of the
objects that are stated by the Information technology system manager. After getting
accustomed with the specification of the objects that are suggested by the Information
technology system manager, the designer starts designing the data base and this gives
high proficiency in the business commencement.
Initiation manager: the initiation manger involves the processing of the entire business
processing. The fact that the initiation manager performs the initiation of the project. The
basic planning of the entire project functioning can be performed with the help of the
initiating manager. This pre planning of the project insists the fact that the projection of
the data management can be performed with the help of the data projection center. This is
the reason that this manager will plan the proclamation of risk management. This is the
reason that the projection of the data management is performed with the help of the data
manager (De Vires 2010). Initiation manager plays an important role in the projection of
TOYOTA
Information Technology system manager: Information Technology system manager is
mainly concerned with the versions of software that is used on the completion of the
project commencement (Rustambekov, 2015).. This incurs the fact that they select the
software’s that are used in the database. This ensures that the processing of the
infrastructure materials are selected by them as they have a valid and in depth conceptual
knowledge regarding the subject. The collaboration of the security design manager and
the information technology system manager acts as a wing for the Toyota organization as
the data management can be performed with the help of proper knowledge gaining
regarding the stuffs that are to be used in the prosecution off the database. The security
system designer has been acting as one of the most important part of the job role of the
information technology system managers they need to understand the configuration of the
objects that are stated by the Information technology system manager. After getting
accustomed with the specification of the objects that are suggested by the Information
technology system manager, the designer starts designing the data base and this gives
high proficiency in the business commencement.
Initiation manager: the initiation manger involves the processing of the entire business
processing. The fact that the initiation manager performs the initiation of the project. The
basic planning of the entire project functioning can be performed with the help of the
initiating manager. This pre planning of the project insists the fact that the projection of
the data management can be performed with the help of the data projection center. This is
the reason that this manager will plan the proclamation of risk management. This is the
reason that the projection of the data management is performed with the help of the data
manager (De Vires 2010). Initiation manager plays an important role in the projection of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

8
TOYOTA
the data management as the entire business process is commenced with the help of the
planning of the project completion.
Information manager: Main role of the information manager is to gather information
regarding the projection of the business completion. This is the main reason that the
completion of the business project includes the better performance in the projection of the
data management. This is the an reason that the information that are gathered in the
processing of the data management system, the Information Technology system manager
gets assisted and this helps in understanding the fact that the processing of the data
management. This is the reason that the importance of the information manager is that the
Information Technology system manager gets assisted by the Information manager as the
data that is generated by the Information manager is used by the Information Technology
system manager for better completion of the project.
Maintenance manager: the monitoring of the entire project is dependent on the processing
of the maintenance manager. After completion of the project by the Information
Technology system manager and the Information technology incurs the projection of the
data commencement and this is the reason that the dependency of the functioning of the
data prosecution can be performed with the help of the projection of the data
management. In case
Suggestion of Improvement
In order to be have a better growth and synchronize of the organization, the organization must
make sure that there security framework of the organization and make some improvements in the
case of management. The security framework must be highly improved and updated according to
the technological advancement that created to instruct the framework of the organization. The
organization must have to make improvements regarding the role of security personnel and
TOYOTA
the data management as the entire business process is commenced with the help of the
planning of the project completion.
Information manager: Main role of the information manager is to gather information
regarding the projection of the business completion. This is the main reason that the
completion of the business project includes the better performance in the projection of the
data management. This is the an reason that the information that are gathered in the
processing of the data management system, the Information Technology system manager
gets assisted and this helps in understanding the fact that the processing of the data
management. This is the reason that the importance of the information manager is that the
Information Technology system manager gets assisted by the Information manager as the
data that is generated by the Information manager is used by the Information Technology
system manager for better completion of the project.
Maintenance manager: the monitoring of the entire project is dependent on the processing
of the maintenance manager. After completion of the project by the Information
Technology system manager and the Information technology incurs the projection of the
data commencement and this is the reason that the dependency of the functioning of the
data prosecution can be performed with the help of the projection of the data
management. In case
Suggestion of Improvement
In order to be have a better growth and synchronize of the organization, the organization must
make sure that there security framework of the organization and make some improvements in the
case of management. The security framework must be highly improved and updated according to
the technological advancement that created to instruct the framework of the organization. The
organization must have to make improvements regarding the role of security personnel and

9
TOYOTA
security framework. There must be proper chain of roles decided as per the work in the
organization of the system management. The suggested improvements are given as follows:
1. There must be updated software and recent development on the operating system of all
the computer system. The original and licensed software should be used in the each case.
The organization must have the licensed software used for improvements and work in
each case. The organization must aid the software and the organization to maintain a
better interface of the system with the using employees. The upgraded systems will be
faster to use and provide better experts to create better experience of the software
(Fujimoto, 2018).
2. The system designing must be robust in nature; the system design must not be hard to
understand and must be implemented according to the organizational requirements. The
system designer must have the total knowledge about the system architecture of the
organization. The system designer must design a better user interface of the organization
so that employees could be quite acquainted with the new technology and the system. he
should have proper knowledge about the security framework according to size of the
organization empowers the organization’s security framework. The system designer
should decide the framework of the organization.
3. The security framework must be applicable according to the system security developer.
The developer must be highly qualified to take the organization’s security as a prime
priority. The developer must have the idea of recent developed frameworks to counter the
cyber-attacks and must be flexible to the implement models to encounter the further
problems.
TOYOTA
security framework. There must be proper chain of roles decided as per the work in the
organization of the system management. The suggested improvements are given as follows:
1. There must be updated software and recent development on the operating system of all
the computer system. The original and licensed software should be used in the each case.
The organization must have the licensed software used for improvements and work in
each case. The organization must aid the software and the organization to maintain a
better interface of the system with the using employees. The upgraded systems will be
faster to use and provide better experts to create better experience of the software
(Fujimoto, 2018).
2. The system designing must be robust in nature; the system design must not be hard to
understand and must be implemented according to the organizational requirements. The
system designer must have the total knowledge about the system architecture of the
organization. The system designer must design a better user interface of the organization
so that employees could be quite acquainted with the new technology and the system. he
should have proper knowledge about the security framework according to size of the
organization empowers the organization’s security framework. The system designer
should decide the framework of the organization.
3. The security framework must be applicable according to the system security developer.
The developer must be highly qualified to take the organization’s security as a prime
priority. The developer must have the idea of recent developed frameworks to counter the
cyber-attacks and must be flexible to the implement models to encounter the further
problems.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

10
TOYOTA
4. The organizational system architecture and the database management is looked forward
by the information system manager. It is mandatory for him to know about the field and
the subject that is to be discussed under the organization.
5. There must be a proper cloud storage and the improvisation should be done on the regular
backup of the organization. the organization must have upgraded database and firewall
security to enhance the better security of the organization(Olovsson, 2016),
6. The organization must have a better organizational surveillance of the system to ensure
that there is less data breach through internal sources. The organization must be highly
improvised to make sure that there is no loopholes in the system security architecture.
Incorporate Training requirements
Security, maintain database and make synchronization of work much easier. This report discuss
the security plan that fulfils all the loopholes of the system architecture of Toyota. It also focuses
on the type of organization, the problems that has been faced by the organization and other
problems the training requirements are the most essential part of the organization. The training
provides the beforehand idea of each and every project that is being implemented in the new
system(McNeil, and Embrechts 2015). The implementation of the training regarding cyber
security to the stakeholders is mentioned in order to make them acquaint that what threats they
could face while accessing the computer system. The proper training makes them ready to
encounter the further attacks that are occurring in the system
TOYOTA
4. The organizational system architecture and the database management is looked forward
by the information system manager. It is mandatory for him to know about the field and
the subject that is to be discussed under the organization.
5. There must be a proper cloud storage and the improvisation should be done on the regular
backup of the organization. the organization must have upgraded database and firewall
security to enhance the better security of the organization(Olovsson, 2016),
6. The organization must have a better organizational surveillance of the system to ensure
that there is less data breach through internal sources. The organization must be highly
improvised to make sure that there is no loopholes in the system security architecture.
Incorporate Training requirements
Security, maintain database and make synchronization of work much easier. This report discuss
the security plan that fulfils all the loopholes of the system architecture of Toyota. It also focuses
on the type of organization, the problems that has been faced by the organization and other
problems the training requirements are the most essential part of the organization. The training
provides the beforehand idea of each and every project that is being implemented in the new
system(McNeil, and Embrechts 2015). The implementation of the training regarding cyber
security to the stakeholders is mentioned in order to make them acquaint that what threats they
could face while accessing the computer system. The proper training makes them ready to
encounter the further attacks that are occurring in the system
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

11
TOYOTA
The training session must be done under the highly qualified professional to ensure that there is a
proper knowledge given to each and every stakeholders of the organization (Mesquida and Mas
2015).
Usage of the ISO Security standard
There are some of the most widely acclaimed ISO security standards .they that can be
implemented in Toyota. The ISO 26000 standard can be implemented within its organizational
structure. There are different areas of improvement or amendment within this security standard
some of which can be addressed by the organization (Revankar and Pai 2017.). There are issues
in the different segments of the standards such as organizational governance, human rights, labor
practice, community envelopment, environmental issues as well as consumer’s issues etc.
Some of the steps that are be taken by Toyota to develop these segments within the
standard. It has come up with more flexible management policies to ensure optimum employee
satisfaction within the workplace. Human rights that are more organized as well as management
of business risk strategies are being developed by the organization. Innovative plans of coming
up with newer vehicles are coming up which will aim in reducing emission of harmful gases like
carbon monoxide in the environment. The ISO 26000 also aims to come up with more strategies
in contributing to the welfare of the society and ensuring better customer satisfaction, thereby
ensuring repeat business from the existing customers all across the world. Most importantly, this
ISO standard will also ensure that the customers will also be able to be happier with the Toyota
products and develop their trust in a brand that is having the ISO 26000 certification (Stojanović,
B. and Ivanović , 2015).
TOYOTA
The training session must be done under the highly qualified professional to ensure that there is a
proper knowledge given to each and every stakeholders of the organization (Mesquida and Mas
2015).
Usage of the ISO Security standard
There are some of the most widely acclaimed ISO security standards .they that can be
implemented in Toyota. The ISO 26000 standard can be implemented within its organizational
structure. There are different areas of improvement or amendment within this security standard
some of which can be addressed by the organization (Revankar and Pai 2017.). There are issues
in the different segments of the standards such as organizational governance, human rights, labor
practice, community envelopment, environmental issues as well as consumer’s issues etc.
Some of the steps that are be taken by Toyota to develop these segments within the
standard. It has come up with more flexible management policies to ensure optimum employee
satisfaction within the workplace. Human rights that are more organized as well as management
of business risk strategies are being developed by the organization. Innovative plans of coming
up with newer vehicles are coming up which will aim in reducing emission of harmful gases like
carbon monoxide in the environment. The ISO 26000 also aims to come up with more strategies
in contributing to the welfare of the society and ensuring better customer satisfaction, thereby
ensuring repeat business from the existing customers all across the world. Most importantly, this
ISO standard will also ensure that the customers will also be able to be happier with the Toyota
products and develop their trust in a brand that is having the ISO 26000 certification (Stojanović,
B. and Ivanović , 2015).

12
TOYOTA
Threats that will be covered by the ISO security standard:
There are different threats that are associated with the ISO 26000 standard that has to be
considered by the organization in order to ensure a smooth work operation. Some of the threats
that are associated with the ISO 26000 standards are described below:
- Unauthorized access to the information networks within Toyota: This can occur when
there are illegal breaches into the Toyota network by the hackers thereby resulting in data
theft and security breach.
- Destruction of the records within the company: This occurs when there is purposeful
destruction of the important data records within the organization thereby resulting in
security compromise of the data within the organization. This is usually caused by
employee vandalism when the employees can purposely cause the data records to be
corrupted or damaged for their own personal as well as professional interests.
- Misuse of audit tools: This can happen when the system administrators of the
organization are dishonest and participate in acts of modifying the different audit trail
items as well as the history of the information about which employee accessed what
information and at what point of time (Whitman and Mattord, 2011). This in turn can
make it difficult or impossible for the administrators to determine or track the culprits
behind any acts of misconduct within the organization (Yoshida and Kojima 2015).
TOYOTA
Threats that will be covered by the ISO security standard:
There are different threats that are associated with the ISO 26000 standard that has to be
considered by the organization in order to ensure a smooth work operation. Some of the threats
that are associated with the ISO 26000 standards are described below:
- Unauthorized access to the information networks within Toyota: This can occur when
there are illegal breaches into the Toyota network by the hackers thereby resulting in data
theft and security breach.
- Destruction of the records within the company: This occurs when there is purposeful
destruction of the important data records within the organization thereby resulting in
security compromise of the data within the organization. This is usually caused by
employee vandalism when the employees can purposely cause the data records to be
corrupted or damaged for their own personal as well as professional interests.
- Misuse of audit tools: This can happen when the system administrators of the
organization are dishonest and participate in acts of modifying the different audit trail
items as well as the history of the information about which employee accessed what
information and at what point of time (Whitman and Mattord, 2011). This in turn can
make it difficult or impossible for the administrators to determine or track the culprits
behind any acts of misconduct within the organization (Yoshida and Kojima 2015).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 17
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




